The SME space is changing, and emerging leaders are utilising affordable, flexible and scalable big data and analytics tools. SMEs are confident about their ability to innovate, but much less certain about their ability to use big data and advanced analytics to do so...

For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

Trusteer warns of evolving 'Ramnit' online banking attack

18 month-old worm reborn as Zeus-inspired banking fraud tool

A piece of malware called Win32.Ramnit, which has been known to security researchers for at least 18 months, has been repurposed to target online banking users, according to security firm Trusteer.

The malware has been altered to include the HTML-injection tactics made famous by Zeus. Ramnit modifies HTML files to intercept and harvest banking details from customers during transit, allowing the attack to occur during what is otherwise a normal, safe banking transaction.

Trusteer said that the attack is made particularly dangerous by the prevalence of Ramnit infections on the web. The company cited figures from Symantec suggesting that Ramnit is responsible for 17.3 per cent of all new malware infections.

"The metamorphosis of Ramnit into financial malware is a sign of things to come now that the Zeus source code has been made openly available to anyone on the internet," said Trusteer chief technology officer Amit Klein.

"Unlike the past, when financial institutions had to defend against a limited number of malware platforms, attacks can now come from virtually any malicious software program, old or new."

Security experts speculated in April that malware writers armed with the Zeus code could craft new attacks that borrow components and techniques from the infamous malware infection.